Alarm/False incident  supression in Netcool

Posted on 2014-04-08
Last Modified: 2014-04-13

I wanted to know if there is a possibility that the alerts for an application which is monitored by netcool could be suppressed during activities like change, upgrades etc?

How can we supress them/How to schedule downtime for perticular server in netcool?

I basically need a dynamic (not scheduled maintenance) way for my NOC Operators to go to a website or GUI, input a list of nodes that need to be suppressed for x amount of
time.  Once they put that list in, it should suppress all events from
those nodes until they either "flip a switch" or the time expires.

Can you please advise?

Thanks in advance

Question by:Rahul Patil
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
LVL 28

Expert Comment

ID: 39989158
Are the events being generated by ISMs? You can just go to the ISM GUI and temporarily deactivate those ISMs.

Author Comment

by:Rahul Patil
ID: 39989409

Not sure how they are monitored.We have different team for monitoring.I just need to know easiest way to achieve this.I am going to ask monitoring team foir the same.

LVL 28

Accepted Solution

mikebernhardt earned 500 total points
ID: 39989625
Check on the above. The ISM GIU is built to make it easy to do exactly what you're looking for.

Featured Post

Visualize your virtual and backup environments

Create well-organized and polished visualizations of your virtual and backup environments when planning VMware vSphere, Microsoft Hyper-V or Veeam deployments. It helps you to gain better visibility and valuable business insights.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A few months ago I attended the Rocky Mountain IPv6 Summit which was a two-day educational event; it was the 3rd annual conference held here in Denver, Colorado that was held at the Hyatt Regency Denver at the Colorado Convention Center. It was an e…
Please see preceding article here: Figure 1 After Root Bridge has been elected, then what?..... Let's start by defining a Root Port in la…
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
After creating this article (, I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

729 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question